Nothing Special   »   [go: up one dir, main page]

Ibne Hossain et al., 2020 - Google Patents

Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: A system of systems problem

Ibne Hossain et al., 2020

View HTML @Full View
Document ID
7100067733454716066
Author
Ibne Hossain N
Nagahi M
Jaradat R
Shah C
Buchanan R
Hamilton M
Publication year
Publication venue
Journal of Computational Design and Engineering

External Links

Snippet

Due to the widespread of new technologies, the modern electric power system has become much more complex and uncertain. The Integration of technologies in the electric power system has increased the exposure of cyber threats and correlative susceptibilities from …
Continue reading at academic.oup.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones

Similar Documents

Publication Publication Date Title
Ibne Hossain et al. Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: A system of systems problem
Nafees et al. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review
Ye et al. A review of cyber–physical security for photovoltaic systems
Knowles et al. A survey of cyber security management in industrial control systems
Qi et al. Cybersecurity for distributed energy resources and smart inverters
Kure et al. Assets focus risk management framework for critical infrastructure cybersecurity risk management
Johnson Roadmap for photovoltaic cyber security
Ray et al. Smart power grid security: A unified risk management approach
Campbell Cybersecurity issues for the bulk power system
Cassottana et al. Resilience analysis of cyber‐physical systems: A review of models and methods
Genge et al. A framework for designing resilient distributed intrusion detection systems for critical infrastructures
Abdelkader et al. Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
Singh et al. Analysis and evaluation of cyber-attack impact on critical power system infrastructure
Baig et al. Cyber-Security Risk Assessment Framework for Critical Infrastructures.
Alrumaih et al. Cyber resilience in industrial networks: A state of the art, challenges, and future directions
Sen et al. On using contextual correlation to detect multi-stage cyber attacks in smart grids
Henry et al. Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations
Almutairy et al. Detection and mitigation of gps spoofing attacks on phasor measurement units using deep learning
Lydia et al. Securing the cyber-physical system: A review
Venkataramanan et al. Enhancing microgrid resiliency against cyber vulnerabilities
Landen et al. DRAGON: Deep reinforcement learning for autonomous grid operation and attack detection
Achaal et al. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
Aslam et al. Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective
Ellinas et al. Critical infrastructure systems: Basic principles of monitoring, control, and security
Syrmakesis et al. Cyber resilience methods for smart grids against false data injection attacks: categorization, review and future directions